[PDF][PDF] Security Testing of Visual Perception Module in Autonomous Driving System

W Hao, W Hao, S Xing, L Minghao… - Journal of Computer …, 2021 - suxnju.github.io
… Aiming at testing the security of the visual perception module of autonomous … security
testing system. Our work proposes a flexible scene description method that balances authenticity

[PDF][PDF] A social psychological analysis of the phenomenon of underreporting cybercrimes and the concomitant underlying factors: Three real local case studies

C Cheng, MCL Chau, ML Chan - Communications Association of Hong …, 2018 - cahk.hk
account information. The friend happened to experience problems with his bank account
verification … a credit card’s three-digit verification code. Fortunately, the scam failed because his …

[PDF][PDF] Downrange: A Survey of China's Cyber Ranges

D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… In considering its “defend forward” mission,2 the US government should devote additional
scrutiny to the cyber ranges with industrial control systems discussed in this report, as the …

[PDF][PDF] The rise of smart courts in China: opportunities and challenges to the judiciary in a digital age

J Peng, W Xiang - Nordic J Law Soc Res (NNJLSR), 2019 - tidsskrift.dk
… number through WeChat, 28 the served can enter face recognition system. When the face
of the served is in front of the camera, the verification of identification can be finished within …

[PDF][PDF] The Xinjiang Papers: An Introduction

A Zenz - The Uyghur Tribunal, November, 2021 - uyghurtribunal.com
… to independently review the work produced by this author, which they did on a pro bono
basis. This author and both peer reviewers were given full access to the entire original file set. …

[PDF][PDF] The Effect of Customer Trust on Customer Loyalty and Repurchase Intention: The Moderating Influence of Perceived CSR

KT Yuen - Degree of Bachelor of Business Administration, 2007 - libproject.hkbu.edu.hk
Corporate Social Responsibility (CSR) has been becoming more and more important in
business environment. This study discusses the impact of the rising interest in CSR issues on …

[PDF][PDF] FLOOD MITIGATION AND LAND RECLAMATION IN HILLY RIVERSA CASE STUDY OF TOORSA RIVER, BHUTAN

RR Patra, GN Paudyal, H Enggrob… - DHI Water and …, 2006 - academia.edu
… This paper presents an application of a numerical modelling system to find a solution to a
complex real life river control problem. Detailed hydraulic analysis supported by the numerical …

[PDF][PDF] Social enterprises in Hong Kong: Toward a conceptual model

KL Tang, HL Fung, KY Au, JKC Lee… - Final report submitted to …, 2008 - researchgate.net
… This report first presents experience on social-enterprise development in Hong Kong,
followed by a review of international experiences from Britain, the United States of America and …

[PDF][PDF] Addressing Security and Computation TS Challenges in IoT Using Machine 醫官Learning

BK Mohanta, U Satapathy, D Jena - researchgate.net
… , data privacy, access control, and intrusion detection system. Similarly, the … The basis of any
security system is addressing the … Then, the authors reviewed some of the work already that …

[PDF][PDF] 阁EasyChair Preprint

SB Bharath, D Chandrasekaran, MS Minu - 2020 - easychair.org
… an authentication process with a User Equipment. It decides on User Equipment authentication,
but it depends on backend service for computing the authentication data and keying …